SecTor 2025 | How Secure Is Your Base Image? A Live Security Test of Popular OSS Containers
Why It Matters
Containers are now the frontline of software supply‑chain attacks, and relying on CVE counting or slow patch cycles leaves organizations exposed to exploits that propagate faster than teams can respond—making proactive image hygiene and secure build pipelines essential to reduce breach risk and regulatory pressure.
Summary
John, CTO and co‑founder of Root, ran a live security assessment of three widely used open‑source container base images—all Debian variants—and demonstrated how common developer practices produce bloated, aging images that harbor serious risks beyond just CVEs. He showed how Dockerfile patterns and build choices create attack surface that standard CVE counts miss, and walked through hands‑on checks and commands to identify these issues. John also highlighted a fast‑moving CISA KEV example to illustrate the widening gap between exploit velocity (now accelerated by automation/agents) and slow, human‑paced remediation. He argues for shifting left with proactive controls, hardened golden images or secure defaults, and tooling that prevents insecure bases from reaching production.
Comments
Want to join the conversation?
Loading comments...